CN114764956A - Vehicle control method and device and readable storage medium - Google Patents

Vehicle control method and device and readable storage medium Download PDF

Info

Publication number
CN114764956A
CN114764956A CN202110001478.6A CN202110001478A CN114764956A CN 114764956 A CN114764956 A CN 114764956A CN 202110001478 A CN202110001478 A CN 202110001478A CN 114764956 A CN114764956 A CN 114764956A
Authority
CN
China
Prior art keywords
vehicle
key
sim
terminal
public key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110001478.6A
Other languages
Chinese (zh)
Other versions
CN114764956B (en
Inventor
傅镜艺
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
China Mobile Communications Ltd Research Institute
Original Assignee
China Mobile Communications Group Co Ltd
China Mobile Communications Ltd Research Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd, China Mobile Communications Ltd Research Institute filed Critical China Mobile Communications Group Co Ltd
Priority to CN202110001478.6A priority Critical patent/CN114764956B/en
Priority claimed from CN202110001478.6A external-priority patent/CN114764956B/en
Publication of CN114764956A publication Critical patent/CN114764956A/en
Application granted granted Critical
Publication of CN114764956B publication Critical patent/CN114764956B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Bioethics (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The application provides a control method, a control device and a readable storage medium of a vehicle, wherein the method comprises the following steps: after the first SIM establishes a Near Field Communication (NFC) connection with a vehicle, sending a verification request to the vehicle; receiving random information sent by the vehicle in response to the authentication request; signing the random information based on a first private key, and sending the signature information to the vehicle; receiving feedback information sent by the vehicle after the signature information is verified based on a first public key, wherein the feedback information is used for indicating that the vehicle is successfully unlocked; the first private key and a first public key in the first vehicle key data are corresponding key pairs. Through this application, it is lower to have solved among the prior art digital car key security, and to the higher problem of limitation at terminal.

Description

Vehicle control method and device and readable storage medium
Technical Field
The embodiment of the application relates to the technical field of vehicle control, in particular to a vehicle control method and device and a readable storage medium.
Background
Compare in traditional entity car key, digital car key provides more portable, dazzling trip experience for the car owner. The digital car key is an effective basis for virtualizing an entity car key into a digital identity to realize mutual authentication of the car and a legal user. Nowadays, digital car keys are usually stored in a mobile phone terminal, vehicle control operation is realized through communication authentication between a mobile phone and a vehicle, and an operation interface is provided for a user by means of the mobile phone, so that the functions of the digital car keys are enriched.
According to the difference of the storage positions of digital car keys in a mobile phone terminal, the existing car key implementation schemes mainly include two types: software solutions and eSE solutions.
1) The software scheme is to store the car key data in an APP (Application).
2) The eSE scheme is characterized in that car key data are stored in a built-in security chip of a mobile phone terminal, the scheme is generally accepted by car enterprises at present and also is a scheme mainly pushed by mobile phone manufacturers, and apples both have private eSE schemes.
The existing mobile phone car key software scheme implementation scheme has the following problems: the car key data are stored in the APP, the security level is not high, and the car key data are stolen. In addition, all users need to develop corresponding APPs according to different operating systems.
The existing mobile phone car key eSE scheme has the following problems: the eSE scheme does not support sharing and migration of digital car keys across mobile phone brands, namely car owners cannot share car keys to relatives and friends using mobile phones of different brands, selection of a car key of a certain mobile phone manufacturer means that a strong binding relationship is formed with the mobile phones of the manufacturer, and if a user selects another mobile phone of another brand, the original car key needs to be deleted and a new mobile phone needs to be used for pairing the car keys again, if the new mobile phone manufacturer does not support the digital car keys, the user cannot use the digital car key service any more. In addition, the vehicle enterprises need to carry out commercial cooperation and adaptation with different mobile phone manufacturers, but the market brands of the mobile phone terminals are complicated, and the eSE implementation modes of all manufacturers cannot be unified, so that the debugging period of the vehicle manufacturer is long, the adaptation workload is large, and the rapid landing of the digital vehicle key service is restricted.
Disclosure of Invention
The embodiment of the application provides a vehicle control method and device and a readable storage medium, and aims to solve the problems that in the prior art, a digital vehicle key is low in safety and high in limitation on a terminal.
To solve the above problem, the present application is implemented as follows:
in a first aspect, an embodiment of the present application provides a control method for a vehicle, which is executed by a first subscriber identity module SIM embedded in a first terminal, and the method includes: after the first SIM establishes a Near Field Communication (NFC) connection with a vehicle, sending a verification request to the vehicle; receiving random information sent by the vehicle in response to the authentication request; signing the random information based on a first private key, and sending the signature information to the vehicle; receiving feedback information sent by the vehicle after the signature information is verified based on a first public key, wherein the feedback information is used for indicating that the vehicle is successfully unlocked; the first private key and a first public key in the first vehicle key data are corresponding key pairs.
In a second aspect, an embodiment of the present application provides a control method of a vehicle, which is executed by a first terminal, and includes: sending a request for applying for a car key service to a background server; receiving data of a target application program sent by the background server under the condition that the background server passes the identity authentication of the first terminal; transmitting data of the target application program to a first SIM built in the first terminal under the condition that a Bluetooth connection is established with the first SIM; after the target application program is installed on the first SIM, receiving a first public key in first vehicle key data fed back by the first SIM, wherein the first vehicle key data further comprises the first public key and a first private key which are key pairs; and sending the first public key to the vehicle through the background server.
In a third aspect, an embodiment of the present application further provides a control method for a vehicle, where the method is performed by the vehicle, and includes: under the condition that an NFC connection is established with a first SIM built in a first terminal, receiving a request sent by the first SIM and used for verifying identity information of the first SIM; sending random information to the first SIM under the condition that the identity information passes verification; receiving signature information obtained after the first SIM signs the random information by using a first private key; verifying the signature information through a first public key, and sending feedback information to the first SIM after the verification is finished, wherein the feedback information is used for indicating that the vehicle is successfully unlocked; the first private key and the first public key are keys which are a key pair in the first vehicle key data.
In a fourth aspect, an embodiment of the present application further provides a control method of a vehicle, which is executed by a second terminal, and the method includes: receiving a sharing link which is sent by a first terminal through a background server and used for sharing the car key service; sending a request for acquiring a car key service to the background server based on the sharing link; receiving a notice for generating car key data sent by the background server; sending the notification to a second SIM built in the second terminal under the condition that Bluetooth connection is established with the second SIM; receiving a second public key in second vehicle key data generated by the second SIM in response to the notification; sending a request for applying an authorization certificate to a first terminal through the background server, wherein the request carries the second public key; the second vehicle key data is the second public key and the second private key of the key pair of the second vehicle key data; receiving a signed authorization certificate sent by the first terminal through the background server; and the signed authorization certificate is obtained by the first terminal through signing by a first private key, and the authorization certificate carries a second public key.
In a fifth aspect, embodiments of the present application further provide a control method for a vehicle, where the method is performed by a second SIM embedded in a second terminal, and the method includes: sending an identity information verification request to the vehicle under the condition of establishing NFC connection with the vehicle; receiving a request sent by the vehicle for requesting an authorization credential if the authentication passes; sending an authorization certificate carrying a second public key to the vehicle; receiving random information sent by the vehicle under the condition that the vehicle determines that the authorization certificate is not in a blacklist and verifies the authorization certificate by using a first public key; signing the random information by using a second private key, and sending signature information to the vehicle; and receiving feedback information sent by the vehicle after the signature information is verified by using the second public key, wherein the feedback information is used for indicating that the unlocking of the vehicle is successful.
In a sixth aspect, an embodiment of the present application further provides a control apparatus for a vehicle, the apparatus including: the first transceiver is used for sending an authentication request to a vehicle and receiving random information sent by the vehicle in response to the authentication request after the first SIM establishes a Near Field Communication (NFC) connection with the vehicle; a first processor to sign the random information based on a first private key; the first transceiver is further configured to send signature information to the vehicle, and receive feedback information sent by the vehicle after the signature information is verified based on a first public key, where the feedback information is used to indicate that unlocking of the vehicle is successful; the first private key and a first public key in the first vehicle key data are corresponding key pairs.
In a seventh aspect, an embodiment of the present application further provides a control device for a vehicle, where the device includes: a second transceiver and a second processor; the second transceiver is used for sending a request for applying for a car key service to a background server, receiving data of a target application program sent by the background server under the condition that the background server passes authentication of a first terminal, and sending the data of the target application program to a first SIM (subscriber identity module) built in the first terminal under the condition that Bluetooth connection is established with the first SIM; the second transceiver is further configured to receive a first public key in first vehicle key data fed back by the first SIM after the target application is installed on the first SIM, and send the first public key to the vehicle through the background server; the first vehicle key data further comprises the first public key and the first private key which are key pairs.
In an eighth aspect, an embodiment of the present application further provides a control apparatus for a vehicle, the apparatus including: a third transceiver, configured to receive, in a case where an NFC connection is established with a first SIM embedded in a first terminal, a request sent by the first SIM for verifying identity information of the first SIM; sending random information to the first SIM under the condition that the identity information passes verification; receiving signature information obtained after the first SIM signs the random information by using a first private key; a third processor, configured to verify the signature information by using the first public key; the third transceiver is further configured to send feedback information to the first SIM after the verification is completed, where the feedback information is used to indicate that the unlocking of the vehicle is successful; the first private key and the first public key are keys which are a key pair in the first vehicle key data.
In a ninth aspect, an embodiment of the present application further provides a control apparatus for a vehicle, the apparatus including: a fourth transceiver and a fourth processor; the fourth transceiver is used for receiving a sharing link which is sent by the first terminal through the background server and used for sharing the car key service, sending a request for obtaining the car key service to the background server based on the sharing link, and receiving a notice which is sent by the background server and used for generating the car key data; the fourth transceiver is further configured to send the notification to a second SIM built in a second terminal under the condition that a bluetooth connection is established with the second SIM, receive a second public key in second vehicle key data generated by the second SIM in response to the notification, and send a request for applying an authorization credential to the first terminal through the background server, where the request carries the second public key; the second vehicle key data is the second public key and the second private key of a key pair, and receives the signed authorization certificate sent by the first terminal through the background server; and the signed authorization certificate is obtained by the first terminal through signing by a first private key, and the authorization certificate carries a second public key.
In a tenth aspect, an embodiment of the present application further provides a control apparatus for a vehicle, the apparatus including: a fifth transceiver and a fifth processor; the fifth transceiver is used for sending an identity information verification request to the vehicle under the condition that the NFC connection is established with the vehicle, and receiving a request for requesting an authorization certificate sent by the vehicle under the condition that the verification is passed; the fifth transceiver is configured to send an authorization credential carrying a second public key to the vehicle, and receive random information sent by the vehicle when the vehicle determines that the authorization credential is not in the blacklist and verifies the authorization credential by using the first public key; the fifth processor is configured to sign the random information using a second private key; the fifth transceiver is configured to send signature information to the vehicle, and receive feedback information sent by the vehicle after the signature information is verified by using the second public key, where the feedback information is used to indicate that unlocking of the vehicle is successful.
In an eleventh aspect, embodiments of the present application further provide a readable storage medium for storing a program, where the program when executed by a processor implements the steps in the method according to the foregoing first aspect, or implements the steps in the method according to the foregoing second aspect, or implements the steps in the method according to the foregoing third aspect, or implements the steps in the method according to the foregoing fourth aspect, or implements the steps in the method according to the foregoing fifth aspect.
In the embodiment of the application, the first vehicle key data is stored in the first SIM built in the first terminal, but not stored in other places in the first terminal, such as the APP of the first terminal, so that the safety of the first vehicle key data is improved; in addition, the first SIM can directly perform data interaction with the vehicle through the NFC, namely, the random information sent by the vehicle can be signed through the first private key in the first vehicle key data, so that the vehicle can inform the first SIM of successful unlocking after verifying the random information through the first public key; because first SIM self has the NFC function, need not to consider whether operating system and the vehicle of terminal match, consequently, only need the vehicle also to have the NFC function and can realize NFC communication. Therefore, through this application, solved among the prior art digital car key security lower, and to the higher problem of limitation at terminal.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings required to be used in the description of the embodiments of the present application will be briefly described below, and it is obvious that the drawings in the description below are only some embodiments of the present application, and it is obvious for those skilled in the art that other drawings may be obtained according to these drawings without inventive labor.
FIG. 1 is a first flowchart illustrating a control method for a vehicle according to an embodiment of the present disclosure;
FIG. 2 is a second flowchart illustrating a control method for a vehicle according to an embodiment of the present disclosure;
FIG. 3 is a third schematic flowchart of a control method for a vehicle according to an embodiment of the present disclosure;
FIG. 4 is a fourth flowchart illustrating a control method of a vehicle according to an embodiment of the present disclosure;
FIG. 5 is a fifth flowchart illustrating a control method of a vehicle according to an embodiment of the present disclosure;
fig. 6 is a schematic diagram of a system for controlling a vehicle based on a USIM full card according to an embodiment of the present application;
fig. 7 is a flowchart of a vehicle key opening service based on a USIM full card according to an embodiment of the present application;
fig. 8 is a flowchart of a USIM full card control vehicle provided in the present application;
fig. 9 is a flow chart illustrating sharing of a vehicle key service provided in the present application;
fig. 10 is a flowchart of a close-friend USIM controlled vehicle provided in the present application;
FIG. 11 is a flow chart illustrating a vehicle key revocation service provided in accordance with an implementation of the present application;
fig. 12 is a first structural diagram of a control device of a vehicle according to an embodiment of the present application;
fig. 13 is a second block diagram of a control device of a vehicle according to an embodiment of the present application;
fig. 14 is a third block diagram of a control device for a vehicle according to an embodiment of the present application;
fig. 15 is a fourth block diagram of a control device for a vehicle according to an embodiment of the present application;
fig. 16 is a fifth configuration diagram of a vehicle control device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some, but not all, embodiments of the present application. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments in the present application without making any creative effort belong to the protection scope of the present application.
The terms "first," "second," and the like in the embodiments of the present application are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus. Further, the use of "and/or" in this application means that at least one of the connected objects, e.g., a and/or B and/or C, means that 7 cases are included where a alone, B alone, C alone, and both a and B are present, B and C are present, a and C are present, and A, B and C are present.
A method for controlling a vehicle according to an embodiment of the present application will be described below.
Referring to fig. 1, fig. 1 is a first flowchart illustrating a control method of a vehicle according to an embodiment of the present disclosure. The control method of the vehicle shown in fig. 1 may be performed by a first subscriber identity card SIM built in the first terminal.
As shown in fig. 1, the control method of a vehicle may include the steps of:
step 101, after establishing a Near Field Communication (NFC) connection between a first SIM and a vehicle, sending a verification request to the vehicle;
step 102, receiving random information sent by a vehicle in response to an authentication request;
103, signing the random information based on the first private key, and sending the signature information to the vehicle;
104, receiving feedback information sent by the vehicle after the signature information is verified based on the first public key, wherein the feedback information is used for indicating that the unlocking of the vehicle is successful; the first private key and the first public key in the first vehicle key data are corresponding key pairs.
As can be seen from the foregoing steps 101 to 104, the first vehicle key data is stored in the first SIM built in the first terminal, but not stored elsewhere in the first terminal, for example, in the APP of the first terminal, so that the security of the first vehicle key data is improved; in addition, the first SIM can directly perform data interaction with the vehicle through NFC, namely the random information sent by the vehicle can be signed through a first private key in the first vehicle key data, so that the vehicle can inform the first SIM of successful unlocking after the vehicle verifies the random information through the first public key; because first SIM self has the NFC function, need not to consider whether operating system and the vehicle of terminal match, consequently, only need the vehicle also to have the NFC function and can realize NFC. Therefore, through this application, solved among the prior art digital car key security lower, and to the higher problem of limitation at terminal.
It should be noted that, in the embodiment, the first SIM and the second SIM in the present application may be USIMs (Universal Subscriber Identity modules, Universal Subscriber Identity cards) in a specific embodiment. The terminal in the embodiment of the application can be a mobile phone, a smart watch, a tablet computer and the like.
In an optional implementation manner of the embodiment of the present application, before establishing the NFC connection with the vehicle, the method of the embodiment of the present application may further include:
step 11, after the first terminal applies for the car key service to the background server, establishing the Bluetooth connection with the first terminal;
step 12, receiving data of a target application program sent by a first terminal;
step 13, installing a target application program locally based on the data, and generating first vehicle key data based on the target application program;
and step 14, pushing the first public key to the background server through the first terminal, wherein the first public key is sent to the vehicle by the background server.
It can be known from the foregoing steps 11 to 14 that, before the first SIM controls the vehicle through the first vehicle key data, the first SIM needs to apply for a vehicle key service to be started first, and a bluetooth connection between the first SIM and the first terminal needs to be established in a vehicle key service starting process, so that the first SIM and the first terminal can implement data communication, and thus, data of a target application program sent to the first terminal by the background server may be sent to the first SIM through the bluetooth connection, so that the first SIM can deploy the target application program generating the first vehicle key data to the first SIM, and thus, an APP does not need to be deployed in the terminal to generate the first vehicle key data, and the first vehicle key data can be generated in the first SIM, thereby improving security of the vehicle key data. In addition, the first SIM needs to send the first public key to the vehicle through the first terminal and the backend server, so as to perform subsequent unlocking control on the vehicle.
In another optional implementation of the embodiment of the present application, the method of the embodiment of the present application may further include:
step 21, after a second SIM built in a second terminal generates second vehicle key data based on a link shared by the first terminal, obtaining a request for applying an authorization certificate sent by the second SIM through a background server, wherein the second vehicle key data includes a second private key and a second public key which are a key pair; the request for applying the authorization certificate carries a second public key;
step 22, under the condition of establishing Bluetooth connection with the first terminal, receiving a notice which is sent by the first terminal and used for generating an authorization certificate; the notification for generating the authorization certificate carries a second public key;
step 23, generating an authorization credential in response to the notification for generating the authorization credential, wherein the authorization credential is the authorization credential signed by the first SIM using the first private key; the signature certificate carries a second public key;
step 24, sending the authorization credential to the second SIM.
Through the above steps 21 to 24, after the second SIM built in the second terminal generates the second vehicle key data based on the link shared by the first terminal, the second SIM may send the second public key to the background server, further, the background server sends a notification for generating the authorization credential to the first SIM, where the notification carries the second public key, and the first SIM responds to the notification, and signs the authority information and the second public key with the first private key to obtain the authorization credential, after the second SIM receives the authorization credential, and after the second SIM establishes the NFC connection with the vehicle, the vehicle may verify the authorization credential with the first public key, since the authorization credential is signed with the first private key, the verification is enabled, and at this time, the vehicle holds the second public key, so that the subsequent unlocking process of the second SIM to the vehicle is consistent with the result process of the first SIM, and verifying the second public key and the second public key to realize unlocking. That is to say, in this application embodiment, the first terminal can share the car key business to the second terminal, then made things convenient for other people to use the vehicle, avoided the inconvenience of entity car key sharing process.
The above is to explain the embodiments of the present application from the first SIM of the first terminal, and the present application will be explained from the perspective of the first terminal.
Referring to fig. 2, fig. 2 is a second flowchart illustrating a control method of a vehicle according to an embodiment of the present application. The control method of the vehicle shown in fig. 2 is executed by the first terminal.
As shown in fig. 2, the control method of the vehicle may include the steps of:
step 201, sending a request for applying for a car key service to a background server;
step 202, receiving data of a target application program sent by a background server under the condition that the background server passes the identity authentication of the first terminal;
step 203, under the condition of establishing Bluetooth connection with a first SIM built in a first terminal, sending data of a target application program to the first SIM;
step 204, after the target application program is installed on the first SIM, receiving a first public key in first vehicle key data fed back by the first SIM, wherein the first vehicle key data further comprises a first public key and a first private key which are mutually key pairs;
step 205, the first public key is sent to the vehicle through the background server.
Through the above steps 201 to 205, the first terminal is used as a carrier of the first SIM, and after data interaction with the background server is realized, data for deploying the target application program is sent to the first SIM through bluetooth connection, so that the first SIM generates the first key data.
In yet another optional implementation manner of the embodiment of the present application, the method of the embodiment of the present application may further include:
step 31, sending a request for sharing the car key service to a background server;
step 32, receiving a sharing link responded by the background server to the request feedback;
step 33, sending a sharing link to the second terminal;
step 34, receiving a request for applying for an authorization certificate sent by the background server, wherein the request for applying for the authorization certificate carries a second public key in second vehicle key data, and the second vehicle key data is generated by a second SIM in the second terminal based on the sharing link; the second vehicle key data comprises a second public key and a second private key which are mutually key pairs;
step 35, sending an authorization certificate to the first SIM under the condition of establishing Bluetooth connection with the first SIM;
step 36, receiving an authorization credential generated by the first SIM, wherein the authorization credential is an authorization credential signed by the first SIM using the first private key; the authorization certificate carries the second public key;
step 37, the signed authorization ticket is sent to the second SIM in the second terminal.
Through the above steps 31 to 37, based on the first terminal, the vehicle key service can be shared with the second SIM in the second terminal, so that the second SIM can also control the same vehicle.
In another optional implementation manner of the embodiment of the present application, after sending the signed authorization ticket to the second terminal, the method of the embodiment of the present application further includes: and sending a request for applying for canceling the car key service of the second terminal to the background server.
That is, after sharing the car key service with the second terminal, the car key service may also be revoked, and the specific revocation will be explained in detail below with respect to the second terminal and the second SIM side.
The method of the embodiment of the present application will be explained below from the perspective of a vehicle; referring to fig. 3, fig. 3 is a third schematic flowchart of a control method of a vehicle according to an embodiment of the present application. The control method of the vehicle shown in fig. 3 is performed by the vehicle.
As shown in fig. 3, the control method of the vehicle may include the steps of:
step 301, receiving a request for verifying identity information of a first SIM sent by the first SIM under the condition of establishing an NFC connection with the first SIM embedded in a first terminal;
step 302, sending random information to the first SIM under the condition that the identity information passes verification;
step 303, receiving signature information obtained by the first SIM signing the random information with the first private key;
step 304, verifying the signature information through the first public key, and sending feedback information to the first SIM after the verification is finished, wherein the feedback information is used for indicating that the unlocking of the vehicle is successful; the first private key and the first public key are keys which are a key pair in the first vehicle key data.
As can be seen from steps 301 to 304, in the case that the NFC connection is established with the first SIM embedded in the first terminal, after the vehicle and the first SIM complete verification through the first private key and the first public key, the unlocking control of the first SIM on the vehicle is implemented. That is to say, because the first SIM itself has the NFC function, it is not necessary to consider whether the operating system of the terminal is matched with the vehicle, and therefore, NFC communication can be achieved only by requiring the vehicle to also have the NFC function.
In an optional implementation manner of the embodiment of the present application, before establishing the NFC connection with the first SIM built in the first terminal, the method of the embodiment of the present application may further include: step 41, receiving a first public key sent by the first terminal through the background server.
Based on the first public key, the vehicle can verify the signature information signed by the first SIM through the first private key by using the first public key in the process of controlling the vehicle through the first SIM, and then unlocking control of the vehicle is realized.
In an optional implementation manner of the embodiment of the present application, the method of the embodiment of the present application may further include:
step 51, receiving a request for verifying identity information sent by a second SIM under the condition of establishing NFC with the second SIM built in a second terminal;
step 52, sending a request for applying an authorization certificate to the second SIM under the condition that the identity information is verified;
step 53, receiving an authorization certificate carrying a second public key fed back by the second SIM;
step 54, under the condition that the authorization certificate is determined not to be in the blacklist, verifying the authorization certificate by using the first public key;
step 55, under the condition that the verification is passed, storing the second public key and sending random information to the second SIM;
step 56, receiving signature information obtained by the second SIM signing the random information by using the second private key;
and step 57, verifying the signature information by using the second public key.
As can be seen from the foregoing steps 51 to 57, after the second SIM is in NFC connection with the vehicle, since the authorization credential is an authorization credential signed by the first SIM using the first private key, the vehicle can verify the authorization credential by using the first public key, and then the vehicle stores the second public key in the authorization credential, and subsequently verifies the signature information, which is sent by the second SIM and signed by using the second private key, by using the second public key, thereby implementing unlocking control of the second SIM on the vehicle.
In another optional implementation manner of the embodiment of the present application, the method steps of the embodiment of the present application may further include:
step 61, receiving a request for canceling the second terminal vehicle key service, which is sent by the first terminal through the background server;
and step 62, deleting the second public key in the second vehicle key data stored locally.
After the second SIM can control the vehicle, the first terminal may revoke the vehicle key service thereof so that the second SIM loses control over the vehicle, and in this process, the authorization credential needs to be added to the blacklist first, and the second public key of the second vehicle key data is deleted, so that the vehicle cannot verify the signature information signed by the second private key and sent by the second SIM, and then the control over the vehicle by the second SIM is revoked. Therefore, the control of other users on the vehicle can be conveniently carried out, the control of other users on the vehicle can be conveniently and quickly cancelled, the control effect on the vehicle is improved, and meanwhile the safety of the vehicle is guaranteed.
The present application will be explained from the perspective of the second terminal, and referring to fig. 4, fig. 4 is a fourth flowchart of a control method of a vehicle provided in an embodiment of the present application. The control method of the vehicle shown in fig. 4 is executed by the second terminal.
As shown in fig. 4, the control method of the vehicle may include the steps of:
step 401, receiving a sharing link which is sent by a first terminal through a background server and used for sharing a car key service;
step 402, sending a request for obtaining a car key service to a background server based on a sharing link;
step 403, receiving a notification for generating vehicle key data sent by the background server;
step 404, under the condition of establishing bluetooth connection with a second SIM built in a second terminal, sending a notification to the second SIM;
step 405, receiving a second public key in second vehicle key data generated by the second SIM in response to the notification;
step 406, sending a request for applying for an authorization credential to the first terminal through the background server, wherein the request carries the second public key; the second vehicle key data is the second public key and the second private key of the key pair of the second vehicle key data;
step 407, receiving a signed authorization certificate sent by the first terminal through the background server; and the signed authorization certificate is obtained by the first terminal through signing by the first private key, and the authorization certificate carries the second public key.
Through the steps 401 to 405, after receiving the sharing link which is sent by the first terminal through the background server and used for acquiring the car key data, the second terminal may notify the second SIM to generate the second car key data, and then the second SIM sends the second public key to the second terminal, the second terminal applies for the authorization credential to the first terminal through the background server, and after the first terminal signs the authority information and the second public key through the first private key, the second terminal receives the signed authorization credential, thereby completing the sharing process of the car key service, so that other subsequent users can control the car.
In another optional implementation manner of the embodiment of the present application, the method of the embodiment of the present application may further include:
step 71, receiving a deleting instruction which is sent by the background server and used for deleting the car key service;
and step 72, sending a deleting instruction for deleting the car key service to the second SIM under the condition that the Bluetooth connection is established with the second SIM.
Through the above steps 71 and 72, after the sharing of the car key service is completed, the cancellation of the car key service, that is, the cancellation of the control of the other users on the car, can also be realized.
The following explains an embodiment of the present application from the second SIM side embedded in the second terminal, referring to fig. 5, and fig. 5 is a fifth flowchart illustrating a control method of a vehicle according to an embodiment of the present application. The control method of the vehicle shown in fig. 5 is performed by the second SIM built in the second terminal.
As shown in fig. 5, the control method of the vehicle may include the steps of:
step 501, under the condition of establishing NFC connection with a vehicle, sending an identity information verification request to the vehicle;
step 502, receiving a request sent by a vehicle for requesting an authorization certificate under the condition that the authentication is passed;
step 503, sending an authorization certificate carrying the second public key to the vehicle;
step 504, receiving random information sent by the vehicle under the condition that the vehicle determines that the authorization certificate is not in the blacklist and verifies the authorization certificate by using the first public key;
step 505, signing the random information by using a second private key, and sending the signature information to the vehicle;
and 506, receiving feedback information sent after the vehicle verifies the signature information by using the second public key, wherein the feedback information is used for indicating that the vehicle is successfully unlocked.
Through the above steps 501 to 506, the second SIM may also implement control over the vehicle, before the control, the second SIM needs to be verified, and when the verification passes, the vehicle is controlled by the second public key and the second private key. By the mode, the control of other users on the vehicle is facilitated.
In an optional implementation manner of the embodiment of the present application, before establishing the NFC connection with the vehicle, the method of the embodiment of the present application may further include:
step 81, after establishing a bluetooth connection with the second terminal, receiving vehicle key data generation notification sent by the second terminal;
step 82, generating second vehicle key data in response to the notification, wherein the second vehicle key data includes a second public key and a second private key which are a key pair;
step 83, sending a second public key to the background server, wherein the background server applies for an authorization certificate to the first SIM through the first terminal after receiving the second public key;
step 84, receiving an authorization credential generated by the first SIM, where the authorization credential is an authorization credential signed by the first SIM using the first private key, and the authorization credential carries the second public key.
Through the above steps 81 to 84, the first terminal may share the car key service with the second terminal, and based on this, the second SIM in the second terminal may generate the second car key data, so that other users may also control the vehicle.
In an optional implementation manner of the embodiment of the present application, after the second SIM in the second terminal generates the second vehicle key data, the method of the embodiment of the present application may further include:
step 91, after establishing a bluetooth connection with the second terminal, receiving an instruction for deleting the car key service forwarded by the second terminal;
step 92, responding to the instruction, and deleting a second public key in the second vehicle key data stored locally;
and step 93, forwarding the execution result to the background server through the second terminal.
Through the steps 91 to 93, the deletion of the vehicle key data in the second SIM can be realized, namely the vehicle key data can be shared with the second SIM and also the vehicle key data can be deleted, so that the convenience of vehicle control is improved, and the safety of vehicle control is ensured.
It should be noted that this embodiment is implemented as an apparatus corresponding to the above method embodiment, and therefore, reference may be made to the relevant description in the above method embodiment, and the same beneficial effects may be achieved. To avoid duplicate description, it is not repeated herein.
Various optional implementations described in the embodiments of the present application may be implemented in combination with each other or separately without conflict, and the embodiments of the present application are not limited herein.
For ease of understanding, examples are illustrated below:
in this example, the present application is explained taking SIM as an example. Based on this, the example provides a system for controlling a vehicle based on a USIM full card, which is a carrier of a digital car key, and a method thereof.
Fig. 6 is a system for controlling a vehicle based on a USIM full card in the embodiment of the present application, and as shown in fig. 6, the system includes: the system comprises a terminal with a built-in digital car key APP, a USIM full card, an application in a car key card (APPLET), a car key service platform, a car enterprise service platform and a car.
The car key service platform and the car enterprise service platform correspond to the background server in the embodiment of the application. The terminal is as digital car key APP's carrier, can provide the visual operation interface of car key business to the car owner, realizes operations such as car key function is opened, car key sharing.
USIM full card: the USIM full card integrates a Bluetooth chip and an NFC chip, and can establish Bluetooth connection with a terminal and NFC connection with a vehicle; digital car keys APPLET (corresponding to the target application program) need to be deployed in advance in the USIM full card.
A vehicle: the vehicle must be equipped with an NFC reader for communicating with the USIM card in the terminal, reading the key information in the card to lock/unlock the door.
Vehicle key service platform: the platform is in butt joint with a vehicle service platform, is a service processing background of a digital vehicle key APP, and realizes a vehicle key APPLET downloading function.
Vehicle business platform: the platform manages owner information, vehicle information and the like, and is connected with the vehicle through a private link, so that issuing, canceling and the like of key information in the vehicle are realized.
It should be noted that the vehicle key service platform and the vehicle enterprise service platform may be integrated on one background server, or may be on different servers.
The control of the vehicle is realized based on the control vehicle system based on the USIM full card, and before the control of the vehicle, the opening of the vehicle key service is firstly realized, namely, a digital vehicle key opening password is obtained after the user purchases the vehicle. The user uses the password to complete service opening through the vehicle key APP, namely vehicle key APPLET deployment in the card and vehicle key data generation are completed. The car key data is a key pair based on a public key cryptosystem, a private key is stored in a USIM full card, and a public key is stored in a digital car key service platform, as shown in figure 7, the method comprises the following steps:
step 701: a user inputs a password by using a car key APP on the terminal;
step 702, the terminal applies for the opening of the car key service to the digital car key service platform and carries the password;
and 703, applying the traffic key starting service to the vehicle service platform by the traffic digital vehicle key service platform.
Step 704, the vehicle business platform verifies the user identity through the password;
step 705, under the condition that the verification is passed, informing the digital car key service platform to open the service;
step 706, the digital car key service platform pushes the APPLET data to the car key APP in the terminal.
Step 707, establishing Bluetooth connection between the vehicle key APP and the USIM full card;
step 708, the vehicle key APP pushes the APPLET data to the USIM full card;
step 709, the USIM full card deploys a vehicle key APPLET to generate vehicle key data (PK1, SK 1);
step 710, returning the public key PK1 to the vehicle key APP;
step 711, the terminal pushes PK1 to a digital vehicle key service platform and stores the PK 1;
step 712, the digital car key service platform pushes PK1 to the car service platform;
at step 713, the vehicle enterprise platform issues PK1 to the vehicle purchased by the user.
In step 714, the car notifies the user of the car key service opening result.
As can be seen from the above steps 701 to 714, since the bluetooth function is integrated on the USIM card, the APPLET can be deployed on the USIM card by establishing the bluetooth connection, thereby avoiding the problem that the built-in APP cannot access the SIM card due to the operating system of the terminal.
In addition, after the activation of the car key service is realized through the above steps 701 to 714, the car owner can control the car by using the digital car key, as shown in fig. 8, the method includes the steps of:
step 801, enabling the vehicle owner to enable the terminal to approach an NFC card reader of the vehicle, and enabling the USIM to establish NFC connection with the vehicle.
Step 802, the vehicle receives an owner identity verification request;
step 803, in case of passing the verification, the vehicle sends random challenge information M to the USIM of the terminal;
step 804, the USIM full card signs M using SK1 (private key);
step 805, the USIM full card returns the signature information to the vehicle;
step 806, the vehicle verifies the signature using the stored owner public key PK1 (public key);
and step 807, if the verification is passed, returning a result to the USIM by the vehicle, and unlocking the door.
Through the steps 801 to 807, since the USIM full card integrates the NFC function, the USIM full card can be connected to the vehicle through the NFC connection, and then data interaction is realized, thereby avoiding the problem that the ordinary subscriber identity card cannot invoke the NFC function of some operating systems without the NFC function.
That is to say, because bluetooth and NFC chip module have been integrateed to user's USIM full card, consequently, can establish the bluetooth with data car key APP based on USIM full card and be connected the issue that realizes the card instruction to can establish NFC with the vehicle and be connected, realize data interaction, broken part model cell-phone machine card passageway barrier.
In the optional implementation of this application embodiment, can also realize the sharing of car key data, the car owner can set up the authority information in APP promptly, shares the car key for relatives and friends. Key sharing, that is, a vehicle owner generates an authorization credential and pushes the authorization credential to relatives and friends through a digital vehicle key service platform, as shown in fig. 9, the vehicle key data sharing method includes the steps of:
step 901, a vehicle owner sends a request for sharing application to a digital vehicle key service platform through a terminal, wherein the request for sharing application carries authority information;
step 902, the digital car key service platform sends the generated sharing invitation link to the terminal of the car owner;
step 903, the vehicle owner sends a sharing link to the terminals of relatives and friends through the terminal;
step 904, the relatives and friends send requests for obtaining applications to the digital car key service platform through the terminal;
step 905, the digital car key service platform sends car key information generation notice to the terminals of relatives and friends.
Step 906, establishing Bluetooth connection between the terminals of relatives and friends and a USIM full card built in the terminals;
step 907, the terminals of relatives and friends send car key information generation notifications to the full USIM card in the terminal;
step 908, the terminals of the relatives and friends generate public and private keys (PK2, SK2) of the car key;
step 909, the USIM whole card in the friend terminal sends PK2 to the digital car key service platform;
step 910, the digital car key service platform sends an instruction carrying PK2 for applying for an authorization credential P to a car key APP;
step 911, the terminal of the vehicle owner establishes a Bluetooth connection with a built-in USIM full card;
in step 912, the terminal of the owner sends an authorization credential generation instruction carrying PK2 to the built-in USIM full card.
Step 913, the USIM in the owner terminal signs the authorization information and PK2 by using the private key SK1 and generates an authorization voucher P;
step 914, USIM in the owner terminal sends authorization voucher P to the terminal;
and step 915, the owner terminal sends an authorization voucher P to the relatives and friends terminal through the digital car key service platform.
Through the steps 901 to 915, the vehicle owner can share the vehicle key data with other terminals, the sharing can be realized without considering the operating system of the terminal and the brand of the terminal, and the possibility of using the vehicle key data is improved.
After the vehicle owner shares the vehicle key data with the relatives and friends, as shown in fig. 10, the method for the relatives and friends to use the vehicle key includes the steps:
and step 1001, enabling relatives and friends to approach the mobile phone to the NFC card reader on the vehicle side, and establishing NFC connection.
Step 1002, the vehicle receives an identity authentication request sent by a friend USIM full card;
step 1003, in the case that the verification is passed, the vehicle requests authorization certificates P and PK2 from the USIM full card of the relatives and friends;
step 1004, the USIM full card of the relatives and friends sends authorization certificates P and PK2 to the vehicle;
step 1005, the vehicle judges whether the authorization voucher is in a blacklist;
step 1006, if not in the blacklist, the vehicle verifies P using the stored owner public key PK1, and if the verification passes, the vehicle stores PK2
Step 1007, the vehicle sends random challenge information M to the USIM full card of the relatives and friends;
step 1008, enabling the complete friend USIM card to sign M by using SK 2;
step 1009, the USIM full card of the relatives and friends returns the signature information to the vehicle;
step 1010, the vehicle verifies the signature using the stored parent-friend public key PK 2;
and step 1011, if the verification is passed, returning a result and unlocking the vehicle door.
Through the steps 1001 to 1011, after the vehicle owner successfully shares the vehicle key data with the relatives and friends, the relatives and friends unlock the vehicle through the terminal and the built-in USIM full card, so that the complexity and inconvenience of unlocking through an entity vehicle key are avoided.
Except that the vehicle key data can be shared so that other users can unlock and lock the vehicle conveniently and quickly, the vehicle key data can be cancelled after other users do not need to use the vehicle, and specifically, a vehicle owner can cancel the own shared digital vehicle key in the vehicle key APP. After the owner performs the revocation operation, the original authorization certificate is added to a blacklist stored in the vehicle, and relatives and friends cannot use the mobile phone to unlock the vehicle door, as shown in fig. 11, the revocation method includes the steps:
step 1101, the terminal of the vehicle owner sends a request for applying for revoking the parent-friend vehicle key data to the digital vehicle key service platform;
step 1102, the digital car key service platform sends a request for canceling the car key data of the relatives and friends terminal to the car service platform;
step 1103, the vehicle business platform sends a request for revoking the vehicle key data of the relatives and friends terminal to the vehicle.
And step 1104, the vehicle adds the authorization certificate identification of relatives and friends to a blacklist, and deletes the public key of the relatives and friends if the public key is stored.
Step 1105, the vehicle returns the execution result to the digital vehicle key service platform through the vehicle service platform;
in step 1106, the digital car key service platform feeds back the revocation result to the terminal of the car owner.
Step 1107, the digital car key service platform sends a car key data deletion instruction to the terminals of relatives and friends;
step 1108, the terminals of relatives and friends establish Bluetooth connection with the USIM full card in the terminal;
step 1109, the terminal of the relatives and friends sends a deletion instruction to the USIM full card in the terminal;
step 1110, deleting PK2 by the USIM full card in the friend terminal;
step 1111, the USIM full card in the relatives and friends terminal returns an execution result to the terminal;
and step 1112, the terminals of the relatives and friends return execution results to the digital car key service platform.
Through the steps 1101 to 1112, the vehicle key data in the friend terminal can be deleted, and the safety of the vehicle is improved under the condition that the friend does not need to use the vehicle.
Referring to fig. 12, fig. 12 is a first structural diagram of a vehicle control device according to an embodiment of the present application, which is applied to a first subscriber identity module SIM embedded in a first terminal, as shown in fig. 12, a vehicle control device 1200 includes:
the first transceiver 1201 is used for sending an authentication request to the vehicle and receiving random information sent by the vehicle in response to the authentication request after the first SIM establishes the Near Field Communication (NFC) connection with the vehicle;
a first processor 1201 for signing random information based on a first private key;
the first transceiver 1201 is further configured to send the signature information to the vehicle, and receive feedback information sent by the vehicle after the signature information is verified based on the first public key, where the feedback information is used to indicate that unlocking of the vehicle is successful; the first private key and the first public key in the first vehicle key data are corresponding key pairs.
Optionally, before establishing the NFC connection with the vehicle, the first processor 1202 is further configured to establish a bluetooth connection with the first terminal after the first terminal applies for the vehicle key service from the background server;
the first transceiver 1201 is further configured to receive data of a target application sent by the first terminal;
the first processor 1202 is further configured to install a target application locally based on the data, and generate first vehicle key data based on the target application;
the first transceiver 1201 is further configured to push a first public key to a backend server through a first terminal, where the first public key is sent to the vehicle by the backend server.
Optionally, the first transceiver 1201 in this embodiment is further configured to, after a second SIM that is built in the second terminal generates second vehicle key data based on a link shared by the first terminal, obtain a request that is sent by the second SIM through the background server and used for applying for an authorization credential, where the second vehicle key data includes a second private key and a second public key that are a key pair of each other; the request for applying the authorization certificate carries a second public key;
a first transceiver 1201, further configured to receive a notification sent by a first terminal for generating an authorization credential in a case where a bluetooth connection is established with the first terminal; the notification for generating the authorization certificate carries a second public key;
the first processor 1202 is further configured to generate an authorization credential in response to the notification for generating the authorization credential, where the authorization credential is an authorization credential signed by the first SIM using the first private key, and the signature credential carries the second public key;
the first transceiver 1201 is also used to send authorization credentials to the second SIM.
It should be noted that the apparatus 1200 can implement each process of the method embodiment in fig. 1 in the embodiment of the present application and achieve the same beneficial effects, and for avoiding repetition, the details are not described here again.
Referring to fig. 13, fig. 13 is a second structural diagram of a control device of a vehicle according to an embodiment of the present application, where the control device is applied to a first terminal, and as shown in fig. 13, a control device 1300 of the vehicle includes: a second transceiver 1301 and a second processor 1302; wherein the content of the first and second substances,
the second transceiver 1301 is configured to send a request for applying for a car key service to the background server, receive data of the target application program sent by the background server when the identity authentication of the first terminal by the background server is passed, and send the data of the target application program to the first SIM when a bluetooth connection is established with the first SIM built in the first terminal;
the second transceiver 1301 is further configured to receive a first public key in the first vehicle key data fed back by the first SIM after the first SIM completes installation of the target application program, and send the first public key to the vehicle through the background server; the first vehicle key data further comprises a first public key and a first private key which are a key pair.
Optionally, the second transceiver 1301 in this embodiment of the application is further configured to send a request for sharing the car key service to the background server, receive a sharing link fed back by the background server in response to the request, and send the sharing link to the second terminal;
the second transceiver 1301 is further configured to receive a request for applying for an authorization credential sent by the background server, where the request for applying for the authorization credential carries a second public key in second vehicle key data, and the second vehicle key data is generated by a second SIM in the second terminal based on the sharing link; the second vehicle key data are a second public key and a second private key of the key pair;
a second transceiver 1301, further configured to send a notification of generating an authorization credential to the first SIM in case of establishing a bluetooth connection with the first SIM;
the second transceiver 1301 is further configured to receive an authorization credential generated by the first SIM, where the authorization credential is an authorization credential signed by the first SIM using the first private key; the authorization certificate carries a second public key;
the second transceiver 1301 is further configured to send the signed authorization credential to a second SIM in the second terminal.
Optionally, after sending the signed authorization credential to the second terminal, the second transceiver 1301 is further configured to send a request for applying for canceling the car key service of the second terminal to the backend server.
It should be noted that the apparatus 1300 can implement each process of the method embodiment in fig. 2 in the embodiment of the present application and achieve the same beneficial effects, and for avoiding repetition, details are not described here again.
Referring to fig. 14, fig. 14 is a third structural diagram of a control device of a vehicle according to an embodiment of the present application, the device being applied to the vehicle, and as shown in fig. 14, a control device 1400 of the vehicle includes: a second transceiver 1401 and a second processor 1402; wherein the content of the first and second substances,
a third transceiver 1401, configured to receive, in a case where an NFC connection is established with a first SIM built in a first terminal, a request sent by the first SIM for verifying identity information of the first SIM; sending random information to the first SIM under the condition that the identity information passes verification; receiving signature information obtained after the first SIM signs the random information by using a first private key;
a third processor 1402, configured to verify the signature information by using the first public key;
the third transceiver 1401 is further configured to send feedback information to the first SIM after the verification is completed, where the feedback information is used to indicate that the unlocking of the vehicle is successful; the first private key and the first public key are keys which are a key pair in the first vehicle key data.
Optionally, before establishing the NFC connection with the first SIM built in the first terminal, the method further includes: the third transceiver 1401 is further configured to receive the first public key sent by the first terminal through the backend server.
Optionally, the third transceiver 1401 is further configured to receive a request for verifying identity information sent by a second SIM when NFC is established with the second SIM built in the second terminal;
a third transceiver 1401, further configured to send a request for applying an authorization credential to the second SIM if the identity information is verified;
the third transceiver 1401 is further configured to receive an authorization credential carrying a second public key and fed back by the second SIM;
a third processor 1402, further configured to verify the authorization credential using the first public key if it is determined that the authorization credential is not on the blacklist;
the third transceiver 1401 is further configured to, in a case that the verification is passed, store the second public key, send the random information to the second SIM, and receive signature information obtained by the second SIM after signing the random information using the second private key;
the third processor 1402 is further configured to verify the signature information using the second public key.
Optionally, the third transceiver 1401 is further configured to receive a request, sent by the first terminal through the backend server, for revoking the vehicle key service of the second terminal;
the third processor 1402 is further configured to delete the second public key in the locally stored second vehicle key data.
It should be noted that the apparatus 1400 can implement each process of the method embodiment in fig. 3 in the embodiment of the present application and achieve the same beneficial effects, and for avoiding repetition, details are not described here again.
Referring to fig. 15, fig. 15 is a fourth structural diagram of a control device of a vehicle according to an embodiment of the present application, where the control device is applied to a second terminal, and as shown in fig. 15, a control device 1500 of the vehicle includes: a second transceiver 1501 and a second processor 1502; wherein, the first and the second end of the pipe are connected with each other,
the fourth transceiver 1501 is configured to receive a sharing link, which is sent by the first terminal through the background server and used for sharing the car key service, send a request for obtaining the car key service to the background server based on the sharing link, and receive a notification for generating car key data sent by the background server;
the fourth transceiver 1501 is further configured to send a notification to a second SIM when the bluetooth connection is established with the second SIM built in the second terminal, receive a second public key in second vehicle key data generated by the second SIM in response to the notification, and send a request for applying an authorization credential to the first terminal through the background server, where the request carries the second public key; the second vehicle key data are a second public key and a second private key of the key pair, and a signed authorization certificate sent by the first terminal through the background server is received; and the signed authorization certificate is obtained by the first terminal through signing by the first private key, and the authorization certificate carries the second public key.
Optionally, the fourth transceiver 1501 is further configured to receive a deletion instruction sent by the background server for deleting the car key service, and send the deletion instruction for deleting the car key service to the second SIM when the bluetooth connection is established with the second SIM.
It should be noted that the apparatus 1500 may implement each process of the method embodiment in fig. 4 in the embodiment of the present application and achieve the same beneficial effects, and for avoiding repetition, details are not repeated here.
Referring to fig. 16, fig. 16 is a fifth structural diagram of a control device of a vehicle according to an embodiment of the present application, where the control device is applied to a second SIM embedded in a second terminal, and as shown in fig. 16, a control device 1600 of the vehicle includes: a fifth transceiver 1601 and a fifth processor 1602; wherein the content of the first and second substances,
a fifth transceiver 1601 for transmitting an identity information authentication request to the vehicle in case of establishing an NFC connection with the vehicle, and receiving a request for requesting an authorization credential transmitted by the vehicle in case of passing the authentication;
the fifth transceiver 1601 is further configured to send an authorization credential carrying the second public key to the vehicle, and receive random information sent by the vehicle when the vehicle determines that the authorization credential is not in the blacklist and verifies the authorization credential by using the first public key;
the fifth transceiver 1601 is further configured to sign the random information using the second private key, send the signature information to the vehicle, and receive feedback information sent by the vehicle after the signature information is verified by using the second public key, where the feedback information is used to indicate that unlocking the vehicle is successful.
Optionally, before the NFC connection is established with the vehicle, the fifth transceiver 1601 is further configured to receive a vehicle key data generation notification sent by the second terminal after the bluetooth connection is established with the second terminal;
a fifth processor 1602, configured to generate second vehicle key data in response to the notification, where the second vehicle key data includes a second public key and a second private key that are each a key pair;
the fifth transceiver 1601 is further configured to send the second public key to the background server; after receiving the second public key, the background server applies for an authorization certificate to the first SIM through the first terminal;
the fifth transceiver 1601 is further configured to receive an authorization credential generated by the first SIM, where the authorization credential is an authorization credential signed by the first SIM using the first private key, and the authorization credential carries the second public key.
Optionally, the fifth processor 1602 is further configured to receive, after establishing a bluetooth connection with the second terminal, an instruction for deleting the car key service forwarded by the second terminal;
a fifth processor 1602, further configured to delete the second public key in the second vehicle key data stored locally in response to the instruction;
the fifth processor 1602 is further configured to forward the execution result to the background server through the second terminal.
It should be noted that the apparatus 1600 can implement each process of the method embodiment in fig. 5 in the embodiment of the present application and achieve the same beneficial effects, and for avoiding repetition, details are not described here again.
The embodiment of the present application further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the computer program implements each process of the control method of the vehicle, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here. The computer readable storage medium is, for example, ROM, RAM, magnetic disk or optical disk.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
Through the description of the foregoing embodiments, it is clear to those skilled in the art that the method of the foregoing embodiments may be implemented by software plus a necessary general hardware platform, and certainly may also be implemented by hardware, but in many cases, the former is a better implementation. Based on such understanding, the technical solutions of the present application or portions thereof that contribute to the prior art may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (which may be a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present application.
While the present embodiments have been described with reference to the accompanying drawings, it is to be understood that the invention is not limited to the precise embodiments described above, which are meant to be illustrative and not restrictive, and that various changes may be made therein by those skilled in the art without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (21)

1. A control method of a vehicle, performed by a first Subscriber Identity Module (SIM) built in a first terminal, the method comprising:
after a first SIM establishes a Near Field Communication (NFC) connection with a vehicle, sending a verification request to the vehicle;
receiving random information sent by the vehicle in response to the authentication request;
signing the random information based on a first private key, and sending the signature information to the vehicle;
receiving feedback information sent by the vehicle after the signature information is verified based on a first public key, wherein the feedback information is used for indicating that the vehicle is successfully unlocked; the first private key and a first public key in the first vehicle key data are corresponding key pairs.
2. The method of claim 1, wherein prior to establishing the NFC connection with the vehicle, the method further comprises:
after the first terminal applies for a car key service to a background server, establishing Bluetooth connection with the first terminal;
receiving data of a target application program sent by the first terminal;
locally installing the target application program based on the data, and generating the first vehicle key data based on the target application program;
and pushing the first public key to the background server through the first terminal, wherein the first public key is sent to the vehicle by the background server.
3. The method of claim 1, further comprising:
after second SIM built in a second terminal generates second vehicle key data based on a link shared by the first terminal, a request for applying an authorization certificate sent by the second SIM through a background server is acquired, wherein the second vehicle key data comprises a second private key and a second public key which are mutually a key pair; the request for applying for the authorization certificate carries the second public key;
under the condition of establishing Bluetooth connection with the first terminal, receiving a notification sent by the first terminal and used for generating the authorization certificate; the notification for generating the authorization credential carries the second public key;
responding to the notification for generating the authorization credential, and generating the authorization credential, wherein the authorization credential is an authorization credential signed by the first SIM using the first private key, and the signing credential carries the second public key;
sending the authorization credential to the second SIM.
4. A control method of a vehicle, performed by a first terminal, characterized by comprising:
sending a request for applying for a car key service to a background server;
receiving data of a target application program sent by the background server under the condition that the background server passes the identity authentication of the first terminal;
transmitting data of the target application program to a first SIM built in the first terminal under the condition that a Bluetooth connection is established with the first SIM;
after the target application program is installed on the first SIM, receiving a first public key in first vehicle key data fed back by the first SIM, wherein the first vehicle key data further comprises the first public key and a first private key which are a key pair;
and sending the first public key to the vehicle through the background server.
5. The method of claim 4, further comprising:
sending a request for sharing the car key service to the background server;
receiving a sharing link responded by the background server to the request feedback;
sending the sharing link to a second terminal;
receiving a request for applying an authorization credential sent by the background server, wherein the request for applying the authorization credential carries a second public key in second vehicle key data, and the second vehicle key data is generated by a second SIM in the second terminal based on the sharing link; the second public key and the second private key of the second vehicle key data are a key pair;
sending a notification to a first SIM to generate the authorization credential if a Bluetooth connection is established with the first SIM;
receiving the authorization credential generated by the first SIM, wherein the authorization credential is signed by the first SIM by using the first private key; the authorization certificate carries the second public key;
and sending the signed authorization certificate to a second SIM in the second terminal.
6. The method of claim 5, wherein after sending the signed authorization ticket to the second terminal, the method further comprises:
and sending a request for applying for canceling the vehicle key service of the second terminal to the background server.
7. A control method of a vehicle, performed by a vehicle, characterized by comprising:
under the condition that an NFC connection is established with a first SIM built in a first terminal, receiving a request sent by the first SIM and used for verifying identity information of the first SIM;
sending random information to the first SIM under the condition that the identity information passes verification;
receiving signature information obtained after the first SIM signs the random information by using a first private key;
verifying the signature information through a first public key, and sending feedback information to the first SIM after the verification is finished, wherein the feedback information is used for indicating that the vehicle is successfully unlocked; the first private key and the first public key are keys which are a key pair in the first vehicle key data.
8. The method of claim 7, wherein prior to establishing the NFC connection with the first SIM embedded in the first terminal, the method further comprises:
and receiving the first public key sent by the first terminal through a background server.
9. The method according to claim 7,
receiving a request for verifying identity information sent by a second SIM under the condition that NFC is established with the second SIM built in a second terminal;
under the condition that the identity information is verified, sending a request for applying for an authorization certificate to the second SIM;
receiving an authorization certificate carrying a second public key fed back by the second SIM;
verifying the authorization credential using a first public key if it is determined that the authorization credential is not on a blacklist;
under the condition that the verification is passed, storing the second public key and sending random information to a second SIM;
receiving signature information obtained after the second SIM signs the random information by using a second private key;
and verifying the signature information by using a second public key.
10. The method of claim 7,
receiving a request of canceling a second terminal car key service sent by a first terminal through a background server;
and deleting the second public key in the second vehicle key data stored locally.
11. A control method of a vehicle, performed by a second terminal, characterized by comprising:
receiving a sharing link which is sent by a first terminal through a background server and used for sharing the car key service;
sending a request for acquiring a car key service to the background server based on the sharing link;
receiving a notice for generating car key data sent by the background server;
sending the notification to a second SIM built in the second terminal under the condition that Bluetooth connection is established with the second SIM;
receiving a second public key in second vehicle key data generated by the second SIM in response to the notification;
sending a request for applying an authorization certificate to a first terminal through the background server, wherein the request carries the second public key; the second vehicle key data is the second public key and the second private key of the key pair;
receiving a signed authorization certificate sent by the first terminal through the background server; and the signed authorization certificate is obtained by the first terminal through signing by a first private key, and the authorization certificate carries a second public key.
12. The method of claim 11,
receiving a deleting instruction which is sent by the background server and used for deleting the car key service;
and sending a deleting instruction for deleting the car key service to the second SIM under the condition of establishing the Bluetooth connection with the second SIM.
13. A control method of a vehicle, performed by a second SIM built in a second terminal, the method comprising:
sending an identity information verification request to the vehicle under the condition of establishing NFC connection with the vehicle;
receiving a request sent by the vehicle for requesting an authorization credential if the authentication passes;
sending an authorization certificate carrying a second public key to the vehicle;
receiving random information sent by the vehicle under the condition that the vehicle determines that the authorization certificate is not in a blacklist and verifies the authorization certificate by using a first public key;
signing the random information by using a second private key, and sending signature information to the vehicle;
and receiving feedback information sent by the vehicle after the signature information is verified by using the second public key, wherein the feedback information is used for indicating that the unlocking of the vehicle is successful.
14. The method of claim 13, wherein prior to establishing the NFC connection with the vehicle, the method further comprises:
after Bluetooth connection with a second terminal is established, receiving vehicle key data generation notification sent by the second terminal;
generating second vehicle key data in response to the notification, wherein the second vehicle key data comprises a second public key and a second private key which are a key pair of each other;
sending the second public key to a background server; after receiving the second public key, the background server applies for an authorization certificate to the first SIM through the first terminal;
and receiving an authorization certificate generated by a first SIM, wherein the authorization certificate is obtained after the first SIM uses a first private key for signature, and the authorization certificate carries the second public key.
15. The method according to claim 13,
after the Bluetooth connection with the second terminal is established, receiving an instruction for deleting the car key service forwarded by the second terminal;
deleting a second public key in the second vehicle key data stored locally in response to the instruction;
and forwarding an execution result to a background server through the second terminal.
16. A control apparatus of a vehicle, characterized by comprising:
the first transceiver is used for sending an authentication request to a vehicle after a first SIM establishes a Near Field Communication (NFC) connection with the vehicle, and receiving random information sent by the vehicle in response to the authentication request;
a first processor to sign the random information based on a first private key;
the first transceiver is further configured to send signature information to the vehicle, and receive feedback information sent by the vehicle after the signature information is verified based on a first public key, where the feedback information is used to indicate that unlocking of the vehicle is successful; the first private key and a first public key in the first vehicle key data are corresponding key pairs.
17. A control apparatus of a vehicle, characterized by comprising: a second transceiver and a second processor; wherein the content of the first and second substances,
the second transceiver is used for sending a request for applying for a car key service to a background server, receiving data of a target application program sent by the background server under the condition that the background server passes the authentication of the first terminal, and sending the data of the target application program to a first SIM (subscriber identity module) built in the first terminal under the condition that Bluetooth connection is established between the second transceiver and the first SIM;
the second transceiver is further configured to receive a first public key in first vehicle key data fed back by the first SIM after the target application is installed on the first SIM, and send the first public key to the vehicle through the background server; the first vehicle key data further comprises the first public key and the first private key which are key pairs.
18. A control apparatus of a vehicle, characterized by comprising:
a third transceiver, configured to receive, when an NFC connection is established with a first SIM built in a first terminal, a request sent by the first SIM for verifying identity information of the first SIM; sending random information to the first SIM under the condition that the identity information passes verification; receiving signature information obtained after the first SIM signs the random information by using a first private key;
a third processor, configured to verify the signature information by using the first public key;
the third transceiver is further configured to send feedback information to the first SIM after the verification is completed, where the feedback information is used to indicate that the unlocking of the vehicle is successful; the first private key and the first public key are keys which are a key pair in the first vehicle key data.
19. A control apparatus of a vehicle, characterized by comprising: a fourth transceiver and a fourth processor; wherein the content of the first and second substances,
the fourth transceiver is used for receiving a sharing link which is sent by the first terminal through the background server and used for sharing the car key service, sending a request for obtaining the car key service to the background server based on the sharing link, and receiving a notice for generating car key data sent by the background server;
the fourth transceiver is further configured to send the notification to a second SIM built in a second terminal under the condition that a bluetooth connection is established with the second SIM, receive a second public key in second vehicle key data generated by the second SIM in response to the notification, and send a request for applying an authorization credential to the first terminal through the background server, where the request carries the second public key; the second public key and the second private key of the second vehicle key data are a key pair, and the signed authorization certificate sent by the first terminal through the background server is received; and the signed authorization certificate is obtained by the first terminal through signing by using a first private key, and the authorization certificate carries a second public key.
20. A control apparatus of a vehicle, characterized by comprising: a fifth transceiver and a fifth processor; wherein the content of the first and second substances,
a fifth transceiver, configured to send an identity information verification request to a vehicle if an NFC connection is established with the vehicle, and receive a request for requesting an authorization credential sent by the vehicle if the verification passes;
the fifth transceiver is configured to send an authorization credential carrying a second public key to the vehicle, and receive random information sent by the vehicle when the vehicle determines that the authorization credential is not in the blacklist and verifies the authorization credential by using the first public key;
the fifth processor is configured to sign the random information using a second private key;
the fifth transceiver is configured to send signature information to the vehicle, and receive feedback information sent by the vehicle after the signature information is verified by using the second public key, where the feedback information is used to indicate that unlocking of the vehicle is successful.
21. A readable storage medium storing a program, characterized in that the program when executed by a processor realizes the steps in the control method of a vehicle according to any one of claims 1 to 3; or implementing a step in a control method of a vehicle according to any one of claims 4 to 6, or implementing a step in a control method of a vehicle according to any one of claims 7 to 10; or, implementing the steps in the control method of the vehicle according to any one of claims 11 to 12; or, implementing the steps in the control method of the vehicle according to any one of claims 13 to 15.
CN202110001478.6A 2021-01-04 Control method and device for vehicle and readable storage medium Active CN114764956B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110001478.6A CN114764956B (en) 2021-01-04 Control method and device for vehicle and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110001478.6A CN114764956B (en) 2021-01-04 Control method and device for vehicle and readable storage medium

Publications (2)

Publication Number Publication Date
CN114764956A true CN114764956A (en) 2022-07-19
CN114764956B CN114764956B (en) 2024-06-07

Family

ID=

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116723508A (en) * 2023-08-04 2023-09-08 小米汽车科技有限公司 Vehicle key creation method, device, storage medium and system
WO2024040564A1 (en) * 2022-08-26 2024-02-29 北京小米移动软件有限公司 Key sharing methods and apparatus, terminal, and computer readable storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104648321A (en) * 2015-01-28 2015-05-27 常州大学 Scheme for optimizing automotive electronics application by utilizing NFC (Near Field Communication) and implementation method of scheme
US20170104589A1 (en) * 2015-10-13 2017-04-13 TrustPoint Innovation Technologies, Ltd. System and Method for Digital Key Sharing for Access Control
CN107846274A (en) * 2016-09-19 2018-03-27 中国移动通信有限公司研究院 A kind of control method and terminal, server, processor
CN109586915A (en) * 2017-09-29 2019-04-05 国民技术股份有限公司 Automobile no-key controls authentication method, user terminal, car-mounted device and server
CN111845624A (en) * 2020-07-24 2020-10-30 重庆长安汽车股份有限公司 Method for starting vehicle without key
CN111923863A (en) * 2020-08-25 2020-11-13 东信和平科技股份有限公司 Vehicle control method based on digital vehicle key
CN112039951A (en) * 2020-08-05 2020-12-04 华人运通(上海)云计算科技有限公司 Safe distribution method, device and system of vehicle Bluetooth key and storage medium

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104648321A (en) * 2015-01-28 2015-05-27 常州大学 Scheme for optimizing automotive electronics application by utilizing NFC (Near Field Communication) and implementation method of scheme
US20170104589A1 (en) * 2015-10-13 2017-04-13 TrustPoint Innovation Technologies, Ltd. System and Method for Digital Key Sharing for Access Control
CN107846274A (en) * 2016-09-19 2018-03-27 中国移动通信有限公司研究院 A kind of control method and terminal, server, processor
CN109586915A (en) * 2017-09-29 2019-04-05 国民技术股份有限公司 Automobile no-key controls authentication method, user terminal, car-mounted device and server
CN111845624A (en) * 2020-07-24 2020-10-30 重庆长安汽车股份有限公司 Method for starting vehicle without key
CN112039951A (en) * 2020-08-05 2020-12-04 华人运通(上海)云计算科技有限公司 Safe distribution method, device and system of vehicle Bluetooth key and storage medium
CN111923863A (en) * 2020-08-25 2020-11-13 东信和平科技股份有限公司 Vehicle control method based on digital vehicle key

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
张超 等: ""基于智能SIM卡的生物特征认证(FIDO认证)"", 《信息通信技术》, 30 November 2017 (2017-11-30) *
方泽强;黄剑锋;: ""一种机动车可定位自动报警智能防盗系统"", 《物联网技术》, 20 January 2017 (2017-01-20) *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2024040564A1 (en) * 2022-08-26 2024-02-29 北京小米移动软件有限公司 Key sharing methods and apparatus, terminal, and computer readable storage medium
CN116723508A (en) * 2023-08-04 2023-09-08 小米汽车科技有限公司 Vehicle key creation method, device, storage medium and system
CN116723508B (en) * 2023-08-04 2023-11-14 小米汽车科技有限公司 Vehicle key creation method, device, storage medium and system

Similar Documents

Publication Publication Date Title
CN110126782B (en) Vehicle intelligent key application method and device
EP2919497B1 (en) Soft sim card activating method and network-joining method and terminal, and network access device
KR102219756B1 (en) Method for managing the state of connected devices
US11578984B2 (en) Vehicle control device and program
CN107623908B (en) Card issuing method and user identification module card
CN112956155B (en) Apparatus and method for negotiating digital certificate between SSP device and server
KR102232966B1 (en) Un-tact digital key service system and method thereof
CN111083670A (en) Vehicle using method and device based on intelligent key
US9319882B2 (en) Method for mutual authentication between a terminal and a remote server by means of a third-party portal
CN105743841A (en) Intelligent hotel room facility control authority distribution method, client and system
CN101155212A (en) Method for limiting use of mobile terminal
CN106211131A (en) The management method of virtual SIM card, managing device, server and terminal
WO2019056971A1 (en) Authentication method and device
CN106231534B (en) Mobile terminal and number writing and eliminating method and device thereof
CN108696361B (en) Configuration method, generation method and device of smart card
CN113572718A (en) Login method, login device, electronic equipment and storage medium
CN114764956B (en) Control method and device for vehicle and readable storage medium
CN114764956A (en) Vehicle control method and device and readable storage medium
CN110091829A (en) A kind of control method and device of car key
JP2020021161A (en) Communication device
CN114613047A (en) Access control system, offline cloud authorization system and method for access control, and medium
KR20130075752A (en) Method for near field transaction by using providing dynamic created code
US10701557B2 (en) Authentication method for connecting a companion device when same is disconnected from a subscriber device
CN115987583B (en) Binding control method for base of intelligent device, base, intelligent device and storage medium
US20220278985A1 (en) Method and device for transferring bundle between devices

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant